Skip to content
Threat Digest
Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware
Nation-State Threats Security Tools Compliance & Policy Cloud Security Threat Intelligence

#developer-security

Visual Studio Code IDE interface with a red warning symbol overlayed, symbolizing a security breach.
Data Breaches

GitHub Breach: Malicious VS Code Extension Exposes 3,800 Repos

GitHub is grappling with a significant breach stemming from a compromised Visual Studio Code extension. The incident highlights the escalating risks within the developer tooling supply chain.

5 min read 2 days, 21 hours ago
Illustration of a computer screen with code and security icons, representing a developer workstation as a potential supply chain vulnerability.
Vulnerabilities & CVEs

Your Laptop Now Ships Software to Attackers

Forget just securing the code repository. A seismic shift is underway, transforming developer workstations into the hottest new target for sophisticated supply chain attacks.

6 min read 5 days, 1 hour ago
Illustration of a shadowy figure in a hooded sweatshirt typing on a laptop with lines of code in the background.
Ransomware & Malware

Quasar Linux Malware: Devs Under Siege

Linux developers, watch your backs. A new stealthy malware, dubbed Quasar Linux (QLNX), is slithering into development environments. This isn't your grandpa's virus; it's a sophisticated implant designed for long-term infiltration and credential theft.

6 min read 2 weeks, 3 days ago
Illustration of a computer screen with code and a sleeping worm icon
Ransomware & Malware

GlassWorm's New Trick: OpenVSX Extensions Now 'Sleep' Before Attacking

The cybersecurity world braced for another supply chain assault, but GlassWorm's latest move in the OpenVSX ecosystem is a quiet, insidious evolution. They're no longer just dropping malware; they're planting seeds.

6 min read 3 weeks, 4 days ago
Terminal window installing malicious LiteLLM package with credential paths exposed
Cloud Security

LiteLLM's Poisoned PyPI Packages Turned Dev Laptops Into Open Credential Safes

One pip install, and your AWS keys were gone. The LiteLLM attack shows developer laptops aren't just tools—they're attacker playgrounds loaded with plaintext secrets.

4 min read 1 month, 2 weeks ago

Categories

Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware Nation-State Threats Security Tools Compliance & Policy Cloud Security
Threat Digest

Threat intelligence. Zero noise.

More

  • RSS Feed
  • Sitemap
  • About
  • Editorial Process
  • Advertise

Legal

  • Privacy
  • Terms
  • Work With Us

Our Network

The AI Catchup AI & Machine Learning Threat Digest Cybersecurity Legal AI Beat Legal Tech Fintech Rundown Finance & Banking DevTools Feed Developer Tools Open Source Beat Open Source Fintech Dose Crypto & DeFi Chip Beat Semiconductors AdTech Beat Ad Technology Supply Chain Beat Logistics

© 2026 Threat Digest. All rights reserved.

🏠Home 🔍Search 🔖Saved 📂Categories
Privacy & cookies

We use a privacy-respecting analytics tool to count page views — no personal profiles, no ad tracking, no third-party cookies. Accept to help us understand which stories matter to readers.

Details